HomeCyber BalkansNew Golang Malware Utilizes Telegram Bot for Command and Control (C2)

New Golang Malware Utilizes Telegram Bot for Command and Control (C2)

Published on

spot_img

Cybersecurity researchers have discovered a new Golang-based backdoor malware that makes use of Telegram as its command-and-control (C2) mechanism. This malware is believed to have originated from Russia and is currently still under development but fully functional. Upon execution, the malware behaves like a backdoor and first checks if it is running from a specific location, “C:\Windows\Temp\svchost.exe.” If not, it copies itself to that location, creates a new process to run the copied version, and then terminates the original instance.

One distinct feature of this malware is its use of an open-source library for Golang, which allows it to communicate with the Telegram Bot API. Through this connection, the malware can receive commands from a chat channel controlled by the actor. Presently, the malware supports four commands, with only three currently operational. These commands enable the malware to execute PowerShell commands using “/cmd,” ensure its persistence by relaunching under a specified file path with “/persist,” and self-destruct with “/selfdestruct.”

Although the code includes a “/screenshot” command, it has not been implemented. Researchers have observed that sending this command triggers a message claiming a screenshot has been captured, despite no actual screenshot being taken. The choice to use Telegram for command-and-control is strategic, as the platform’s simplicity allows attackers to easily set up and execute attacks. The inclusion of Russian text in one of the commands further supports the notion that this malware may be linked to a larger campaign involving Russian threat actors.

Netskope Threat Labs has drawn attention to the challenges posed by cloud apps for defenders, citing the example of this malware utilizing Telegram as a means to conduct complex attacks. The simplicity of creating Telegram-based C2 channels and the ability to mask malicious activities within legitimate traffic make it challenging for security teams to detect and neutralize such threats effectively.

In conclusion, the emergence of this Golang-based backdoor malware utilizing Telegram highlights the evolving tactics employed by cybercriminals to evade detection and carry out malicious activities. As threat actors continue to exploit accessible platforms like Telegram for their operations, cybersecurity professionals face an ongoing battle to stay ahead of these sophisticated attacks and safeguard digital environments from compromise.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...